COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization? (Choose two.)
A
Enforcing the organization’s internet usage policy
B
An increase in bandwidth availability
C
Preventing emails containing threats
D
Identifying and disposing of infected content
E
Preventing phishing attempts
Explanation: 

Detailed explanation-1: -Web threat filtering prevents a user from visiting websites with known malicious content. An administrator can monitor sites that have become infected with spyware or other malware and add them to the list of blocked sites. Content filtering can block users from visiting specific categories of websites.

Detailed explanation-2: -Expert Answer. The ideal way to give access to confidential resources over the internet is by using a virtual private network because encrypting all data ensures a safe connection between the client and server.

Detailed explanation-3: -Which of the following describes how access control lists can be used to improve network security? EXPLANATION An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.

Detailed explanation-4: -Each zone is separated by a firewall that ensures only specific traffic is allowed. Which of the following is the secure architecture concept that is being used on this network? EXPLANATION The secure network architecture concept that is being used in this example is network segmentation.

There is 1 question to complete.